Snooping and Inspecting Traffic
783
How Is the DHCP Snooping Bindings Database Populated?
The DHCP snooping application uses DHCP messages to build and maintain
the binding’s database. DHCP snooping creates a tentative binding from
DHCP DISCOVER and REQUEST messages. Tentative bindings tie a client
to a port (the port where the DHCP client message was received). Tentative
bindings are completed when DHCP snooping learns the client’s IP address
from a DHCP ACK message on a trusted port. DHCP snooping removes
bindings in response to DECLINE, RELEASE, and NACK messages. The
DHCP snooping application ignores the ACK messages as a reply to the
DHCP Inform messages received on trusted ports. You can also enter static
bindings into the binding database.
When a switch learns of new bindings or loses bindings, the switch
immediately updates the entries in the database. The switch also updates the
entries in the binding file. The frequency at which the file is updated is based
on a configurable delay, and the updates are batched.
If the absolute lease time of the snooping database entry expires, that entry is
removed. Make sure the system time is consistent across the reboots.
Otherwise, the snooping entries will not expire properly. If a host sends a
DHCP release while the switch is rebooting, when the switch receives the
DHCP discovery or request, the client’s binding goes to the tentative binding
as shown in Figure 27-1.
Figure 27-1. DHCP Binding
The binding database includes data for clients only on untrusted ports.
Tentative
Binding
Complete
Binding
No Binding
ACK
Discover
Discover
Request
Release
NACK
Decline
NACK
Содержание PowerConnect M6220
Страница 52: ...52 Introduction ...
Страница 86: ...86 Switch Features ...
Страница 100: ...100 Hardware Overview ...
Страница 116: ...116 Using the Command Line Interface ...
Страница 121: ...Default Settings 121 ...
Страница 122: ...122 Default Settings ...
Страница 142: ...142 Setting Basic Network Information ...
Страница 206: ...206 Configuring Authentication Authorization and Accounting ...
Страница 292: ...292 Managing General System Settings Figure 11 31 Verify MOTD ...
Страница 296: ...296 Managing General System Settings ...
Страница 332: ...332 Configuring SNMP ...
Страница 408: ...408 Monitoring Switch Traffic ...
Страница 560: ...560 Configuring Access Control Lists ...
Страница 582: ...582 Configuring VLANs Figure 21 6 Add Ports to VLAN 4 Click Apply 5 Verify that the ports have been added to the VLAN ...
Страница 591: ...Configuring VLANs 591 Figure 21 17 GVRP Port Parameters Table ...
Страница 597: ...Configuring VLANs 597 Figure 21 24 Double VLAN Port Parameter Table ...
Страница 693: ...Configuring Port Based Traffic Control 693 Figure 24 3 Storm Control 5 Click Apply ...
Страница 780: ...780 Configuring Connectivity Fault Management ...
Страница 804: ...804 Snooping and Inspecting Traffic Figure 27 17 DAI Interface Configuration Summary ...
Страница 818: ...818 Snooping and Inspecting Traffic ...
Страница 836: ...836 Configuring Link Aggregation ...
Страница 860: ...860 Configuring Data Center Bridging Features ...
Страница 906: ...906 Configuring DHCP Server Settings ...
Страница 940: ...940 Configuring L2 and L3 Relay Features Figure 34 3 DHCP Relay Interface Summary ...
Страница 1080: ...1080 Configuring VRRP ...
Страница 1104: ...1104 Configuring IPv6 Routing ...
Страница 1124: ...1124 Configuring DHCPv6 Server and Relay Settings Relay Interface Number Vl100 Relay Remote ID Option Flags ...
Страница 1131: ...Configuring Differentiated Services 1131 Figure 40 5 DiffServ Class Criteria ...
Страница 1158: ...1158 Configuring Class of Service Figure 41 1 Mapping Table Configuration CoS 802 1P ...
Страница 1174: ...1174 Configuring Auto VoIP Figure 42 2 Auto VoIP Interface Configuration ...
Страница 1240: ...1240 Managing IPv4 and IPv6 Multicast Figure 43 51 DVMRP Next Hop Summary ...
Страница 1266: ...1266 Managing IPv4 and IPv6 Multicast ...
Страница 1274: ...1274 System Process Definitions ...
Страница 1294: ...1294 Index ...